Cryptography/Related Articles: Difference between revisions
Jump to navigation
Jump to search
imported>Howard C. Berkowitz (First rearrangement) |
No edit summary |
||
(8 intermediate revisions by 4 users not shown) | |||
Line 3: | Line 3: | ||
==Parent topics== | ==Parent topics== | ||
{{r|Information security}} | {{r|Information security}} | ||
{{r|Information theory}} | {{r|Information theory}} | ||
{{r|Communications intelligence||**}} | {{r|Communications intelligence||**}} | ||
==Subtopics== | ==Subtopics== | ||
Line 28: | Line 27: | ||
{{r|Rotor machine}} | {{r|Rotor machine}} | ||
{{r|Vigenère cipher}} | {{r|Vigenère cipher}} | ||
{{r|SIGABA}} | {{r|SIGABA}} | ||
{{r|Quantum cryptography}} | {{r|Quantum cryptography}} | ||
Line 37: | Line 35: | ||
===Cryptanalysis=== | ===Cryptanalysis=== | ||
{{r|Cryptanalysis}} | {{r|Cryptanalysis}} | ||
{{r|ULTRA}} | |||
===Key management=== | ===Key management=== | ||
{{r|Internet Key Exchange}} | {{r|Internet Key Exchange}} | ||
Line 47: | Line 47: | ||
{{r|William Friedman}} | {{r|William Friedman}} | ||
{{r|Auguste Kerckhoffs}} | {{r|Auguste Kerckhoffs}} | ||
{{R|Alan Turing}} | |||
===Organizations=== | |||
{{r|Communications Security Establishment}} | |||
{{r|Defense Signals Directorate}} | |||
{{r|FAPSI}} | |||
{{r|Government Communications Security Bureau}} | |||
{{r|National Security Agency}} | |||
==Other related topics== | ==Other related topics== | ||
{{r|politics of cryptography}} | {{r|politics of cryptography}} | ||
Line 59: | Line 67: | ||
{{r|Public Key Infrastructure}} | {{r|Public Key Infrastructure}} | ||
===Mathematical principles=== | ===Mathematical principles=== | ||
{{r|Random number}} | {{r|Random number generator}} | ||
{{r|Unicity distance}} | {{r|Unicity distance}} | ||
{{r|Zero-knowledge protocol}} | {{r|Zero-knowledge protocol}} | ||
==Articles related by keyphrases (Bot populated)== | |||
{{r|Computer Go}} | |||
{{r|RSA algorithm}} | |||
{{r|Key management}} |
Latest revision as of 11:00, 3 August 2024
- See also changes related to Cryptography, or pages that link to Cryptography or to this page or whose text contains "Cryptography".
Parent topics
- Information security [r]: The set of policies and protective measures used to ensure appropriate confidentiality, integrity and availability to information; usually assumed to be information in a computer or telecommunications network but the principles extend to people and the physical world [e]
- Information theory [r]: Theory of the probability of transmission of messages with specified accuracy when the bits of information constituting the messages are subject, with certain probabilities, to transmission failure, distortion, and accidental additions. [e]
Subtopics
Modes of encryption
- Bulk encryption [r]: The encipherment of all traffic on a digital transmission medium, without awareness of multiplexed channels, data link protocols, etc., in the medium. [e]
- Message encryption [r]: Add brief definition or description
- IPsec [r]: Internet Protocl security is a set of protocols for providing encryption and/or authentication services for Internet packets. [e]
- Secure Sockets Layer [r]: Add brief definition or description
- Transport Layer Security [r]: Add brief definition or description
Ciphers
- Cipher [r]: A means of combining plaintext (of letters or numbers, or bits), using an algorithm that mathematically manipulates the individual elements of plaintext, into ciphertext, a form unintelligible to any recipient that does not know both the algorithm and a randomizing factor called a cryptographic key [e]
- Alphabetic substitution [r]: Add brief definition or description
- Advanced Encryption Standard [r]: A US government standard issued in 2002 for a stronger block cipher to succeed the earlier Data Encryption Standard. [e]
- Data Encryption Standard [r]: A block cipher specification issued by the U.S. government in 1976, intended for sensitive but unclassified data. It is now obsolescent, succeeded by the Advanced Encryption Standard, but still used in commercial systems. [e]
- Diffie-Hellman [r]: A technique that allows two parties to safely establish a shared secret for use as a cryptographic key, even if someone is eavesdropping on their interaction. It requires that the parties have some means of authentication to be sure they are talking to the right person. [e]
- Enigma machine [r]: The primary high-security cryptographic communications security machine of Nazi Germany. Unknown to the Germans, it had been substantially cryptanalyzed by the British Government Code and Cipher School, with French, Polish, and U.S. help. [e]
- Feistel cipher [r]: Add brief definition or description
- Hagelin machine [r]: Add brief definition or description
- One-time pad [r]: A cipher system in which the cryptographic key, i.e. the secret used to encrypt and decrypt messages, is a sequence of random values, each one of which is only ever used once, and only to encrypt one particular letter or word. [e]
- Playfair cipher [r]: Add brief definition or description
- Pretty Good Privacy [r]: E-mail encryption package created by Phillip Zimmerman. [e]
- Rotor machine [r]: Add brief definition or description
- Vigenère cipher [r]: Add brief definition or description
- SIGABA [r]: Add brief definition or description
- Quantum cryptography [r]: Add brief definition or description
- TACLANE [r]: Add brief definition or description
- FASTLANE [r]: Add brief definition or description
Codes
Cryptanalysis
- Cryptanalysis [r]: Add brief definition or description
- ULTRA [r]: Add brief definition or description
Key management
- Internet Key Exchange [r]: Add brief definition or description
- Key generation (cryptographic) [r]: Add brief definition or description
- Key management (cryptographic) [r]: Add brief definition or description
- Session key [r]: Add brief definition or description
Personalities
- Claude Shannon [r]: Add brief definition or description
- William Friedman [r]: Add brief definition or description
- Auguste Kerckhoffs [r]: Add brief definition or description
- Alan Turing [r]: Add brief definition or description
Organizations
- Communications Security Establishment [r]: Add brief definition or description
- Defense Signals Directorate [r]: Add brief definition or description
- FAPSI [r]: Add brief definition or description
- Government Communications Security Bureau [r]: Add brief definition or description
- National Security Agency [r]: Add brief definition or description
- Politics of cryptography [r]: Add brief definition or description
- Privacy [r]: Add brief definition or description
- Steganography [r]: Add brief definition or description
- Covert channel [r]: Add brief definition or description
Authentication
- Authentication [r]: Add brief definition or description
- Digital certificate [r]: Add brief definition or description
- Digital signature [r]: Add brief definition or description
- Extensible Authentication Protocol [r]: Add brief definition or description
- Public Key Infrastructure [r]: Add brief definition or description
Mathematical principles
- Random number generator [r]: Add brief definition or description
- Unicity distance [r]: Add brief definition or description
- Zero-knowledge protocol [r]: Add brief definition or description